31
Becoming familiar with the SGMI
Leaving the SGMI
Viewing DeepSight’s ThreatCon status
The Symantec ThreatCon rating, a feature of Symantec DeepSight, gives you a real-time measurement
of global threat exposure, providing early warning of active attacks. This lets you prioritize your IT
resources to better protect your critical information from a potential attack. With improved
protection, you can avoid down time and lost productivity.
The time shown above the ThreatCon rating indicates the time of the most recent change to the
ThreatCon status. The link below the Symantec ThreatCon indicator takes you to the Symantec
Security Response Web site, where you can learn more about using the Symantec DeepSight threat
management system to evaluate and improve your security posture.
A summary of current vulnerabilities is displayed below the Security Response link.
Note:
If the security gateway has not been configured to access the Internet, this link is blank.
Related information
For further information related to this topic, see the following:
■
“Integrating Symantec DeepSight Threat Management System”
Leaving the SGMI
You can leave the SGMI in three ways:
■
By logging off
The Symantec Gateway Security Series 5000 Series v3.0 logon dialog box is displayed on your
desktop to let you log on and manage the same appliance again or log on to another appliance.
■
By exiting from the SGMI
The SGMI closes without displaying a logon dialog box.
■
By allowing your connection to time out
When you leave the SGMI inactive, the application logs you off based on the UI inactivity timeout
value. You can change the inactivity timeout value on the Advanced Options tab of the System >
Administration window.
A Relogin dialog box displays to let you re-establish your connection to the security gateway from
which you timed out.
Note:
Unless you log off completely by exiting from the SGMI, other administrators who try to access
the security gateway will only have read access.
Prerequisites
None.
Leave the SGMI
When you actively leave the SGMI by logging off or exiting, if you have made configuration changes,
you are prompted to save them.
When you time out, changes are preserved but they are not automatically saved. You must log on again
to save changes.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...